cryptoserver-cp5-stage
The VS-NfD-compliant solution for key processing and storage

VS-NfD Protect

Highest security for the complete protection of sensitive data

  • The only BSI-approved HSM on the market
  • Approved up to classification RESTREINT UE/EU RESTRICTED, NATO RESTRICTED, and VS-NfD
  • Secure key processing and storage in a high-security environment

Product Type:

Firmware

Supported Platforms:

Delivery Time:

About 2-4 weeks
Key Benefits

Key Benefits

Icon

Approved by the BSI

CryptoServer CP5 VS-NfD is the only BSI-approved HSM on the market and is therefore the alternative secure solution for key processing and storage in accordance with VS-NfD requirements.

Icon

RESTREINT UE/EU RESTRICTED and NATO RESTRICTED approved

Approved for key storage and processing up to classification RESTREINT UE/EU RESTRICTED and NATO RESTRICTED.

Icon

Secure key processing and storage within the HSM

Meets regulatory data security standards by storing and processing the cryptographic keys within the VS-NfD approved HSM.

Details

Details

CryptoServer CP5 VS-NfD – The hardware security module for the processing of classified data*

As the only BSI-approved VS-NfD HSM on the market, CryptoServer CP5 VS-NfD offers the ideal solution for various VS-NfD-compliant applications such as certificate creation for authentication and access control or secure key generation and management. CryptoServer CP5 VS-NfD is the central trust anchor for the backup and processing of your classified* data.

In addition to meeting the strict criteria for the protection of data classified in Germany, CryptoServer CP5 VS-NfD is also RESTREINT UE/EU RESTRICTED and NATO RESTRICTED. The listings for the various approvals can be viewed at the following links.

You can view the listing as a VS-NfD-approved HSM here.
The listing as RESTREINT UE/EU RESTRICTED HSM is available here.
The listing as NATO RESTRICTED HSM can be found here.

* Until classification classified – For official use only

cryptoserver-cp5-products

 

Features

Easy integration

  • Support for Windows and Linux operating systems.
  • Wide range of integration options
  • Supports standardized interfaces, e.g. PKCS #11 and Microsoft Cryptography Next Generation (CNG)
  • UTIMACO Cryptographic eXtended services Interface (CXI) for easy integration into your own applications

Simple and secure management

  • Comprehensive key management with key authorization
  • Multi-client capability
  • Remote Management
  • Secure firmware update 

Reliable access control

  • Configurable role-based access control and segregation of duties
  • “m out of n” quorum authentication (e.g. 3 out of 5)
  • 2-factor authentication using smart cards

Meets the highest safety requirements

  • VS-NfD approval
  • RESTREINT UE/EU RESTRICTED and NATO RESTRICTED approval
  • Common Criteria EAL4+ certified
  • Protection against attacks by passive and active tamper protection mechanisms 

Available as a simulator 

  • Dedicated software simulator for evaluation and integration tests 

Technical Specifications

Support of numerous cryptographic algorithms

  • RSA, ECDSA with NIST and Brainpool curves
  • ECDH with NIST and Brainpool curves
  • AES
  • CMAC, HMAC
  • SHA2 family, SHA3
  • Hash-based deterministic random number generator (DRG.4 according to AIS 31)
  • True random number generator (PTG.2 according to AIS 31)
  • Up to 3000 RSA or 2500 ECDSA signature operations when processing in bulk mode

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance
  • PCIe Card

 

Related to this product

Add-ons

u.trust 360

Remote HSM Management and Monitoring

Find more details

Bundle

DiskEncrypt

Reliable hard drive encryption for laptops with VS-NfD computing.

Find out more

u.trust LAN Crypt

Software-based file and folder encryption

Find out more

 

Contact us

We look forward to answering your questions.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0